# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0a9a4d9cd1bf25f04aa8023d5c98513a6d29179782fe93bff1d8a4103597e040
Pseudo Output
dc1d67f934e6d55d3334217637abdbf51b8d3d25a8b0bfc70932bd12940ec73c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66486845a397679fbd7dd63fbf331bd4808123489cb923d514b05bcbdbece554
Commitment
0e46c2faaf5b293b20ab31b27f1df13dbe3b1ab3423a62f41102bc6eca78a64f
Range Proof
672 bytes (Bulletproof)
Memo
be0c04948cbf3d001d03787254e9e0e74b3da21eaa2aa837388a5eaac3469fba419d746af857eff6669db68c7e9e7c06889cc7f3034ee16bf73dad32dd0ffadc6b049019e24d902e580605c8af13b6de434f020b9718652bc8acf25ccad6198a0275a5cf70a1f0ad3747fd9c491cdf5a2f7d672be935ac6685930304e5913cad (encrypted)
Stealth Address
84c672dd9e67bdb1c0028007c30e6ade62e03ecf5059fbd11aba39f9eaf1231e
Commitment
5640435e6c5dfcd355c964b61a6f86b0603a409615272e8b3ff78ad16cdb814b
Range Proof
672 bytes (Bulletproof)
Memo
c0f74e15f4c72fa1d105803f0a35b50fa4317b54166994d6af3787c236bfcde52b75fb1c6e753b0a3503bd2a1017dcb3b4fdb3659813472c55e281a554468dd1897a9546ef1a7dd1863a079945ea7c943be7e8088f90ccd47da3925f2e3ca0f1a56fce8249ad6654567af71c90c0443a8d0b49a69db195dfa298fdd1c94f5354 (encrypted)
Stealth Address
565e49c111b0f257623dade0e6f3086fd5b245d08cf240cb4ac6e46ff36a725f
Commitment
8cc1a607c55e7ad12d1b7732d7c93403be1ffa5c15f07ba7cf1480a96bf02113
Range Proof
672 bytes (Bulletproof)
Memo
63c20e544f42ad8d30f020a7142a266298d63246ad9404aed7acdf7fa16dab5a16ec8ac74ae28f5062c989833de9e762ff90ae470c12d3bb5e0fff9ffcded9561f29bc405b976bad42f86147d369c2f76f4f71e6f06f78c8e083b698ccd353db7a883a03363ec10aaaa77f9e37b1e70ed95b7f32ede6a73d2954064a757bb40f (encrypted)